The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many real world applications and abstract concepts are exhibiting relationships and connectivity with the graph theory. Graph theory is very intuitive and its ubiquity makes it very natural. Various emerging information and communication technologies combining graph theory concepts for assessing and validating today's security concerns in an easy way. In this article, we proposed graph theoretical...
In this paper, an implementation of remote waking-up Personal Computers (PCs) through UDP and Wake On LAN (WOL) is presented. With the implementation, PCs can be sus pende d w hile it is in idle time. Also, PCs can be waked up interactively from remote site when users want to perform required tasks. There is a few barriers to wake a PC up from remote site using WOL. By providing a solution for the...
Malware today often uses very sophisticated methods to avoid being detected on the victim machine itself. However, hiding the actual communication between an attacker and his malware is often neglected by malware authors. As a consequence, intermediate hosts inspecting the incoming and outgoing traffic of the victim host may be able to detect the infection. In this paper, we describe a proof-of-concept...
Monitoring of Internet services shows that there is a global and growing trend in the use of Cloud Services. This paper aims to identify and quantify the use of Cloud Services taking the University of Minho (UMinho) network as a practical case study. Thus, this study focuses on characterizing Cloud Storage services, identifying the most accessed Cloud Storage Providers and the characteristics of corresponding...
We present an end-to-end supervised based system for detecting malware by analyzing network traffic. The proposed method extracts 972 behavioral features across different protocols and network layers, and refers to different observation resolutions (transaction, session, flow and conversation windows). A feature selection method is then used to identify the most meaningful features and to reduce the...
The configuration for address mapping is an important process for IPv4-over-IPv6 (4over6) technology, which is the major scenario of IPv6 transition. However, it is not straightforward to use current configuration methods because they were only designed to solve part of the configuration scenario. In this paper, we first analyze the challenges of current configuration solutions. After that, we propose...
Transfer data in only one network segment is not a sticky work. However, communication between different network segments is worth studying. Especially when one or both sides network segment behind NAT devices. This text has a brief description about the classification of NAT, and explains the problems that need to be solved about NAT traversal. According to the features of NAT and the needs of our...
The production network at Arizona State University uses a commercial load balancer for \texttt{syslog} messages from the firewalls at the data center perimeter. The logs are carried in UDP packets and the load balancer divides the load among servers based on the source IP address. This may cause a server to be overwhelmed due to the high incoming data rate, and create log files unequal in size. These...
This paper starts with the presentation of results from an IPv6-darknet experiment that we conducted during summer 2012. The experiment indicates that attackers are gaining interest in IPv6 networks and appropriate security tools need to be readied. Therefore, we propose HoneydV6, a low-interaction IPv6 honeypot that can simulate entire IPv6 networks and which may be utilized to detect and analyze...
Distributed Denial of service (DDoS) attack is an attempt to prevent the legitimate users from using services provided by service providers. This is done through flooding their server with the unnecessary traffic. These attacks are performed on some prestigious web sites like Yahoo, Amazon and on various cloud service providers. The severity of the attack is very high, as a result the server goes...
With the rapid growth of the Internet speed and emergence of new applications, the amount of Internet traffic is continuously increasing. In order to provide stable Internet service, efficient network management based on accurate traffic identification is gaining much importance than ever. Header signature-based identification method for network management can be identified the network traffic quickly...
The aim of paper to presents the contain problem in automatic tunneling. Automatic tunneling has three main components to encapsulate IPv6 packets into IPv4 packets. The components called Teredo, ISATAP, and 6to4. In some cases, these components related problems such as source routing, neighbor discovery and NAT holes. This paper present key issues related to the Teredo tunneling called "Teredo...
Throughput-sensitive server workloads are expected to handle voluminous independent and concurrent transactions that require careful designing of an on chip interconnect. State of the art applications take in a very high and even unbounded working sets with concurrent data. It demands for suitable architectural changes for on chip interconnect to maintain the performance of concurrent applications...
Network systems are becoming the core components of technical information infrastructures. The protection of network systems from malicious attacks is an urgent priority in our society. However, considering that all security threats are very complicated, easily missed, and error-prone, dealing with network vulnerabilities has brought about enormous challenges to network management. Therefore, one...
SDN proposes a logically centralized architecture where the control entity (SDN controller) is responsible for providing an abstraction of network resources through Application Programming Interfaces (API). This abstraction enables SDN to perform network virtualization, that is, to slice the physical infrastructure and create multiple co-existing network slices (virtual networks) independent of the...
The OpenFlow (OF) protocol is widely used in Software Defined Networking (SDN) to realize the communication between the controller and forwarding devices. OF allows great flexibility in managing traffic flows. However, OF alone is not enough to build more complex SDN services that require complete control and management of the data plane (e.g. configurations of ports, queues, etc.). The current work...
In this article the authors examine the concept of software defined network (SDN). In the beginning there is a short historical background of the ”software defined network” as the scientific and technological concept given, by whom it was introduced and what it means. Substantial attention is paid to the OpenFlow protocol. Further, the authors consider development of SDN technology similarly to ideas...
In Release 11, the 3rd Generation Partnership Project (3GPP) introduced the ability for Service Capability Servers (SCS) / Machine-to-Machine (M2M) Servers to request that the Mobile Core Network (MCN) deliver a Short Message Service (SMS) device trigger to the User Equipment (UE). The ability to send a trigger avoids the need for the UE to maintain constant contact with the SCS via keep-alive messaging...
The Software-Defined Networking (SDN) paradigm allows networking hardware to be made “malleable” and remotely manageable by the so-called SDN controllers. However, the current SDN landscape is extremely fragmented. Different open and closed source controller frameworks such as Open-Daylight [1], Ryu [2], Floodlight [3], etc. exist. Porting SDN applications from one such platform to another is practically...
Traffic classification is an important task for providing differentiated service quality to applications and also for security monitoring. With the advent of peer-to-peer applications and tunneling techniques it is becoming increasingly difficult to identify the traffic without going to the application semantics. Several approaches have been proposed (with varied success) which use machine learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.